Srl | Item |
1 |
ID:
137950
|
|
|
Summary/Abstract |
On 14 February 1945, King Abdul-Aziz ibn Saud of Saudi Arabia stepped aboard the USS Quincy, anchored in the Great Bitter Lake in the Suez Canal, to meet the dying American president, Franklin D Roosevelt. Roosevelt was returning from Yalta where, with Joseph Stalin and Winston Churchill, he had decided the fate of the post-war world. Roosevelt and Ibn Saud had a convivial discussion for several hours before going their separate ways.
|
|
|
|
|
|
|
|
|
|
2 |
ID:
171669
|
|
|
Summary/Abstract |
The rise to prominence of Daesh and its expert exploitation of extremist propaganda has brought in to focus the role of strategic communications in counterterrorism (CT) and countering violent extremism policy. Nonetheless, strategic communications tends to be discussed largely in relation to counter-recruitment and counter-radicalisation. Using the UK’s CT strategy as a case study, Andrew Glazzard and Alastair Reed argue that strategic communications has a far wider application in CT.
|
|
|
|
|
|
|
|
|
|
3 |
ID:
162888
|
|
|
Summary/Abstract |
Many writers fought and several died in the British armed forces in the First World War. But those writers who were too old to enlist were also affected, especially those with children of fighting age. The novelist Joseph Conrad, born in Russian-occupied Poland in 1857 but a naturalised British citizen from 1886, spent three anxious years while his son Borys fought on the Western Front in the Army Service Corps. But Borys was not Conrad’s only source of anxiety when the war ended in 1918.
|
|
|
|
|
|
|
|
|
|
4 |
ID:
171670
|
|
|
Summary/Abstract |
This article is in two parts. The first is theoretical and sets out the basis for why communications in the field of countering violent extremism (CVE) may be more effective if they are participative rather than strategic and rhetorical. The second provides emerging lessons from a pilot CVE intervention, ‘Preventive Communication’, which was undertaken with the involvement of the authors as part of two larger CVE projects in Kenya between 2016 and the present day.
|
|
|
|
|
|
|
|
|
|